Searched defs:chain (Results 1 - 9 of 9) sorted by relevance

/system/extras/simpleperf/
H A Dcallchain.h28 std::vector<SampleEntry*> chain; member in struct:CallChainNode
H A Dcallchain.cpp31 const std::vector<SampleEntry*>& chain, size_t chain_start) {
33 for (i = 0, j = chain_start; i < node->chain.size() && j < chain.size(); ++i, ++j) {
34 if (!MatchSampleByName(node->chain[i], chain[j])) {
44 if (MatchSampleByName(node->chain.front(), sample)) {
51 static std::unique_ptr<CallChainNode> AllocateNode(const std::vector<SampleEntry*>& chain, argument
55 for (size_t i = chain_start; i < chain.size(); ++i) {
56 node->chain.push_back(chain[
30 GetMatchingLengthInNode(const CallChainNode* node, const std::vector<SampleEntry*>& chain, size_t chain_start) argument
[all...]
/system/keymaster/
H A Dandroid_keymaster_messages_test.cpp568 keymaster_cert_chain_t* chain = &deserialized->certificate_chain; local
570 EXPECT_NE(nullptr, chain->entries);
571 EXPECT_EQ(3U, chain->entry_count);
572 EXPECT_EQ(3U, chain->entries[0].data_length);
573 EXPECT_EQ(0, memcmp("foo", chain->entries[0].data, 3));
574 EXPECT_EQ(3U, chain->entries[1].data_length);
575 EXPECT_EQ(0, memcmp("bar", chain->entries[1].data, 3));
576 EXPECT_EQ(3U, chain->entries[2].data_length);
577 EXPECT_EQ(0, memcmp("baz", chain->entries[2].data, 3));
H A Dasymmetric_key.cpp221 static bool allocate_cert_chain(size_t entry_count, keymaster_cert_chain_t* chain, argument
223 if (chain->entries) {
224 for (size_t i = 0; i < chain->entry_count; ++i)
225 delete[] chain->entries[i].data;
226 delete[] chain->entries;
229 chain->entry_count = entry_count;
230 chain->entries = new keymaster_blob_t[entry_count];
231 if (!chain->entries) {
238 // Copies the intermediate and root certificates into chain, leaving the first slot for the leaf
242 keymaster_cert_chain_t* chain, keymaster_error_
240 copy_attestation_chain(const KeymasterContext& context, keymaster_algorithm_t sign_algorithm, keymaster_cert_chain_t* chain, keymaster_error_t* error) argument
[all...]
H A Dandroid_keymaster_test.cpp3498 static bool verify_chain(const keymaster_cert_chain_t& chain) { argument
3499 for (size_t i = 0; i < chain.entry_count - 1; ++i) {
3500 keymaster_blob_t& key_cert_blob = chain.entries[i];
3501 keymaster_blob_t& signing_cert_blob = chain.entries[i + 1];
/system/netd/server/
H A DFirewallController.cpp48 // fw_dozable chain is called from both INPUT and OUTPUT, this includes both packets that we need
111 int FirewallController::enableChildChains(ChildChain chain, bool enable) { argument
114 switch(chain) {
224 FirewallType FirewallController::getFirewallType(ChildChain chain) { argument
225 switch(chain) {
239 int FirewallController::setUidRule(ChildChain chain, int uid, FirewallRule rule) { argument
245 FirewallType firewallType = getFirewallType(chain);
257 switch(chain) {
277 ALOGW("Unknown child chain: %d", chain);
[all...]
H A DBandwidthController.cpp84 * - quota'd rules in the costly chain should be before bw_penalty_box lookups.
88 * - global quota for all costly interfaces uses a single costly chain:
330 std::string BandwidthController::makeIptablesSpecialAppCmd(IptOp op, int uid, const char *chain) { argument
340 ALOGE("Append op not supported for %s uids", chain);
352 asprintf(&buff, "%s %s -m owner --uid-owner %d", opFlag, chain, uid);
384 const char *chain,
411 ALOGE(failLogTemplate, appStrUids[uidNum], appUids[uidNum], chain);
419 iptCmd = makeIptablesSpecialAppCmd(op, uid, chain);
421 ALOGE(failLogTemplate, appStrUids[uidNum], uid, chain);
429 iptCmd = makeIptablesSpecialAppCmd(IptOpDelete, appUids[uidNum], chain);
383 manipulateSpecialApps(int numUids, char *appStrUids[], const char *chain, IptJumpOp jumpHandling, SpecialAppOp appOp) argument
[all...]
/system/security/keystore/include/keystore/
H A DIKeystoreService.h102 keymaster_cert_chain_t chain; member in struct:android::KeymasterCertificateChain
/system/security/keystore/
H A DIKeystoreService.cpp212 memset(&chain, 0, sizeof(chain));
216 keymaster_free_cert_chain(&chain);
244 keymaster_free_cert_chain(&chain);
252 chain.entries = reinterpret_cast<keymaster_blob_t*>(malloc(sizeof(keymaster_blob_t) * ucount));
253 if (!chain.entries) {
254 ALOGE("Error allocating memory for certificate chain");
258 memset(chain.entries, 0, sizeof(keymaster_blob_t) * ucount);
260 if (!readKeymasterBlob(in, &chain.entries[i])) {
262 keymaster_free_cert_chain(&chain);
1856 KeymasterCertificateChain chain; local
[all...]

Completed in 408 milliseconds